首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
超密集网络是根据汇聚节点的拓扑属性进行测度中心加权融合的网络模型,超密集网络中容易受到类似于DOS等病毒的拒绝服务攻击。由于DOS病毒特征具有频谱混迭特性,在超密集网络难以有效识别。目前采用联合特征检测方法进行病毒攻击信息的检测识别,性能随着环境干扰影响起伏较大。提出一种基于幅频响应带宽检测的病毒攻击识别算法。进行病毒攻击的数学模型构建和信号分析,然后设计格型陷波器实现攻击信号的干扰抑制和滤波,根据病毒攻击信号的检测带宽和攻击带宽,选取不同的陷波器频率参数和带宽参数,进行频谱特征混迭加权处理,提取幅频响应特征进行病毒攻击的带宽检测,实现攻击特征识别。仿真结果表明,采用该算法对超密集网络中的病毒攻击进行幅频响应特征提取,具有较好的抗干扰性能,准确检测识别概率优越于传统算法,在网络安全领域具有较好的应用价值。  相似文献   

2.
新型的网络病毒的入侵和传播以正态谐振方式进行连续攻击,检测困难,需要对病毒攻击进行有效检测。传统的检测方法采用干扰攻击定位状态转移特征提取的层次性检测算法实现对病毒连续攻击的检测,算法没能自适应求解连续攻击下的特征选择参数,检测性能不好。提出一种基于窄带信号频谱偏移修正的正态谐振网络病毒连续攻击下的重叠检测算法。采用链重叠检测和向量化运算模拟正态谐振网络病毒的攻击特征和相关性质,实现对病毒的检测,通过Langevin方程描述,正态谐振网络的病毒连续攻击表现为一种双稳态非线性驱动多频共振模型,采用窄带信号频谱偏移修正方法,计算得到病毒节点连接概率以及个体的感染率,提高检测性能。仿真结果表明,该算法对病毒传播有较好的抑制性,提高了对网络病毒连续攻击下的检测性能和重叠检测能力。  相似文献   

3.
对网络攻击信号进行盲分离,实现对攻击信号的准确有效检测。传统的网络攻击信号检测算法使用时频分析方法,提取非平稳群攻击信号的时频特征,实现信号检测,但算法把网络入侵检测正确率作为约束目标函数进行同步最优特征子集求解,复杂度较高,提出一种引入合同变换矩阵的网络攻击信号盲分离算法。采用时频分析Viterbi算法,得到信号谱的平均频率等于瞬时频率的时间平均,根据合同变换矩阵,对攻击信号进行离散数据解析化处理,构建网络攻击信号的解析模型,得到网络统计信号在多复变边界条件下的时频特征,实现盲分离算法改进。仿真实验表明,该算法能有效实现对网络攻击信号的盲分离,盲分离结果能准确反映网络攻击信号的内部特征,提高了对网络攻击信号的检测能力,对攻击信号的检测性能有所提高,保证了网络安全。  相似文献   

4.
ipsweep攻击信号广泛存在于复杂进化网络系统中,对其实现自校正分离,进行攻击信号准确检测。传统算法采用PSO辨别树算法进行复杂进化网络的ipsweep攻击自校正分离算法设计,存在自适应差和检测性能不好的问题。提出一种基于Dopplerlet变换匹配投影ipsweep攻击自校正分离算法。提取攻击信号传播路径的随机概率密度特征,计算自校正分离属性的信息熵的预测值,提取信号在Dopplerle空间中相干点积功率累积尺度坐标,得到ipsweep攻击信号的自校正分离模型改进设计。仿真结果表明,该算法能有效提高对ipsweep攻击信号检测性能,传统算法的检测概率为63%,而该算法的检测概率为92%,检测性能提升明显,且能有效实现对ipsweep攻击信号Dopplerle空间谱检测。  相似文献   

5.
恶意干扰下的网络病毒信息具有较强的高斯随机性和带宽性,传统的时频分析方法及小波特征检测方法难以实现对该类病毒入侵的有效检测。提出一种基于盲频谱检测的恶意干扰下网络病毒检测算法。构建了恶意干扰下的网络病毒入侵的信号模型构建,采用高斯平滑滤波算法进行干扰抑制预处理,提取滤波后的恶意干扰下病毒数据的盲频谱特征,以此为数据基础实现对网络入侵的准确检测。仿真结果表明,采用该文算法进行网络病毒检测识别准确度较高,性能优越,保障了网络安全。  相似文献   

6.
提出一种基于随机近场混叠谱分析的网络攻击数据散布特征挖掘算法,实现对衰落噪声干扰下的网络攻击信号的准确检测。采用自适应陷波器对衰落干扰噪声进行滤波降噪预处理,提高了待检测信号的纯度,进行随机近场混叠谱分析,采用时频分析方法进行攻击信号的时延估计,提取随机近场混叠谱特征,实现网络攻击数据散布特征挖掘优化。仿真实验表明,采用该算法能有效提取在强衰落噪声干扰下的网络攻击数据时频散布特征点,特征聚焦性能明显,提高了对网络攻击数据的检测性能。  相似文献   

7.
在分布式社交网络中,产生Biclique攻击信号,需要对其进行攻击延迟容忍设计,提高对病毒攻击的检测和容忍性能。传统方法中采用基于攻击信号方向性聚类延迟容忍算法,当传播路径具有发散性时,检测性能不好。提出一种基于Biclique攻击信号方向性空间搜索属性特征分解的攻击延迟容忍算法。把数据主特征建模和特征提取分类与缺省副本创建处理同步进行,得到更小的响应时间,实现攻击延迟容忍,得到基于Biclique攻击信号方向性空间搜索属性特征分解结果,进行Biclique攻击信号检测,提高对攻击信号延迟容忍性能和检测性能,仿真结果表明,采用该算进行分布式社交网络中Bi-clique攻击检测,检测性能提高34.5%,算法能有效保证分布式社交网络的安全性和对病毒攻击信号的容忍性。  相似文献   

8.
提出采用Lorenz混沌系统异步跟踪优化期望最大化高斯混合模型算法实现对低信噪比下深度伪装的网络攻击信号最优检测。通过提取待检测网络数据流参数向量和正常数据流参数向量的差值为特征,使用高斯混合模型并与期望最大化算法相结合,设计Lorenz混沌异步跟踪检测算法,对网络数据流进行建模和检测。仿真结果表明改进的检测算法能有效去除不是攻击信号的伪峰,相比Hough变化检测算法,能更加正确地检测非法攻击信号,信噪比为-15dB下,不同异步攻击中的检测概率就能达到100%,实现检测性能最优,尤其适用于信噪比极低的深度伪装网络攻击环境中对攻击信号的检测。研究成果为网络安全防御及应用具有巨大的理论参考价值。  相似文献   

9.
翁国秀 《科技通报》2015,(2):152-154
网络病毒感染的免疫性分析是提高网络安全性能的重要因素。由于网络病毒具有发散指向性,导致对网络病毒的感染免疫性分析建模困难。提出基于多频自适应共振检测的网络病毒感染免疫性分析模型,构建多路复用器输入输出的网络病毒感染模型,进行病毒信息特征预处理,得到用户约束对照多路复用状态下的病毒入侵干扰链路结构。根据自相关函数极限分离定理,在极向环空间内进行自相关成分分析,以代价函数最小化的形式进行病毒感染强度快速寻优分离,由此实现对病毒感染的免疫性分析模型构建。通过仿真实验结果表明,采用该算法,对网络在遭受病毒感染下的免疫控制性能较平稳,代价开销控制精度合理,网络波动被约束到了一个较小的范围,展示了方法优越的病毒感染限定和免疫性能。  相似文献   

10.
多目标无限方差网络攻击作为一种新的病毒攻击方式,对网络安全造成严重威胁,通过对多目标攻击源的时频盲源分离,准确检测和发掘攻击信号源和特征,提高检测性能。传统方法中对攻击源的分离算法采用随机场谱峰搜索算法,存在计算量大的问题。提出一种基于近场源DOA估计的多目标无限方差网络攻击下时频盲源分离算法。为了提高多目标无限方差网络攻击近场源的识别概率,对提取得到的波束域约束指向性特征输出结果进行频分复用分解,通过时频特征提取,得到相关的攻击信号源参数,在多目标无限方差网络攻击近场源模型中,设计匹配滤波器,把近场源的参数估计问题变成了一个三维参数联合DOA估计问题,实现对网络攻击源时频盲源分离。仿真结果表明,具有较好的网络攻击时频盲分离性能,对攻击源估计的均方根误差较传统算法明显减小,实现了对攻击信源的准确识别和检测。  相似文献   

11.
Aresearch group led by Prof. ZHAI Qiwei from the Institute for Nutritional Sciences under the CAS Shanghai Institutes for Biological Sciences has discovered that even relatively low doses of resveratrol--a chemical found in the skins of red grapes and in red wine--can improve the sensitivity of mice to the hormone insulin, according to a report in the October,2007 issue of Cell Metabolism. As insulin resistance is often characterized as the most critical factor contributing to the development of Type 2 diabetes, the findings“provide a potential new therapeutic approach for preventing or treating” both conditions, the researchers said.  相似文献   

12.
This study examined how students who had no prior experience with videoconferencing would react to the use of videoconferencing as an instructional medium. Students enrolled in seven different courses completed a questionnaire at the beginning of the semester and again at the end of the semester. Students at the origination and remote sites did not differ in their reactions toward videoconferencing but there was a significant difference for gender. Women reacted less favorably to videoconferencing. Compared to the beginning of the semester, students reported significantly less positive attitudes toward taking a course through videoconferencing at the end of the semester. There were no significant differences in students' attitudes toward videoconferencing across courses at the beginning of the semester but there were significant differences across the courses at the end of the semester. The results suggest the need for better preparation for both students and instructors.  相似文献   

13.
Ajoint study by Prof. ZHANG Zhibin from the CAS Institute of Zoology and his co-workers from Norway, US and Swiss have indicated that historical outbreaks of migratory locusts in China were associated with cold spells, suggesting that China's projected climate warming could decrease the pest's numbers. The study was published in Proceedings of theNational Academy of Sciences on 17 September, 2007.  相似文献   

14.
A computer-mediated group is a complex entity whose members exchange many types of information via multiple means of communication in pursuit of goals specific to their environment. Over time, they coordinate technical features of media with locally enacted use to achieve a viable working arrangement. To explore this complex interaction, a case study is presented of the social networks of interactions and media use among members of a class of computer-supported distance learners. Results show how group structures associated with project teams dominated who communicated with whom, about what, and via which media over the term, and how media came to occupy their own communication niches: Webboard for diffuse class-wide communication; Internet Relay Chat more to named others but still for general communication across the class; and e-mail primarily for intrateam communication. Face-to-face interaction, occurring only during a short on-campus session, appears to have had a catalytic effect on social and emotional exchanges. Results suggest the need to structure exchanges to balance class-wide sharing of ideas with subgroup interactions that facilitate project completion, and to provide media that support these two modes of interaction.  相似文献   

15.
Active biological molecules and functional structures can be fabricated into a bio-mimetic system by using molecular assembly method. Such materials can be used for the drug delivery, disease diagnosis and therapy, and new nanodevice construction.  相似文献   

16.
CAS should stick to the principle of rendering service to, and giving impetus for, the development of China's science enterprise by making S&T innovations, said CAS President LU Yongxiang. The CAS president made the remarks in a recent talk to communicate the gist of the winter session of the Party's Leading-member Group at CAS, which was held from 7 to 11 January in Beijing.  相似文献   

17.
Electronic data interchange (EDI) provides means for interorganizational communication, creates network externalities, requires an advanced information technology (IT) infrastructure, and relies on standards. In the diffusion of such innovations, institutional involvement is imperative. Such institutions contain governmental agencies, national and global standardization organizations, local government, and nonprofit private organizations like industry associations. The last type of organizations we call intermediating institutions. They intermediate or coordinate ("inscribe") the activities of a group of would-be adopters. Unfortunately, little is known of how these organizations shape the EDI diffusion trajectory. In this article we examine one specific type of intermediating organizations?industry associations?and how they advanced the EDI diffusion process in the grocery sectors of Hong Kong, Denmark and Finland. We identify six institutional measures, placed into a matrix formed by the mode of involvement (influence vs. regulation) and the type of diffusion force (supply push vs. demand pull), that can be mobilized to further the EDI diffusion. Industry associations were found to be active users of all these measures to varying degrees. Their role was critical especially in knowledge building, knowledge deployment, and standard setting. Furthermore, institutional involvement varied due to policy and cultural contingencies and power dependencies.  相似文献   

18.
With great care, Dr. ZHOU Zhonghe takes out a package wrapped by cotton tissue from a drawer and says: "This is the gem of our collections: the fossil of a bird that lived 125 million years ago!" Then, pointing at a tiny mound, he explains: "Look, this is the claw and that is the head. It was in the egg shell and ready to hatch ... The species fell into a family of waterside inhabitants."  相似文献   

19.
This essay focuses on universal service and the Internet as means to support social and political participation. The emphasis on access to telecommunications systems in conventional approaches to universal service is contrasted with access to content. A model of the information environment is described that accounts for the roles of content and conduit, both of which are necessary conditions to achieve true access. A method is outlined for employing information indicators to observe or measure the information environment.  相似文献   

20.
The increasing prospects of digital piracy has prompted the perceived need by electronic publishers to adopt technical systems of protection, and governments to reform their copyright laws. This article is a preliminary study of the management of intellectual property by electronic publishers, defined as those involved in the production of online databases, and CD-ROMs. It focuses on three main issues: (1) how electronic publishers view the increasing threat of piracy; (2) the methods of protection employed to protect intellectual property in digital format; and (3) the importance of technological protection of intellectual property in electronic publications. The analysis is based on a sample of 23 UK electronic publishers. The interviews revealed an interesting assortment of protection methods and did not show that technological protection was a preferred way. Instead, the means of protection, in addition to copyright law, comprised niche markets, pricing, trust, bad publicity, and nontechnical and technical means.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号